政大機構典藏-National Chengchi University Institutional Repository(NCCUR):Item 140.119/152771
English  |  正體中文  |  简体中文  |  Post-Print筆數 : 27 |  Items with full text/Total items : 113648/144635 (79%)
Visitors : 51578696      Online Users : 938
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version
    Please use this identifier to cite or link to this item: https://nccur.lib.nccu.edu.tw/handle/140.119/152771


    Title: 基於ECDH 和短簽名的群組密鑰機制之分析與改良
    Analysis and Improvement of Group Key Mechanism Based on ECDH and Short Signatures
    Authors: 蕭銘彰
    HSIAO, MING-CHANG
    Contributors: 左瑞麟
    Tso, Ray-lin
    蕭銘彰
    HSIAO, MING-CHANG
    Keywords: 群組通信
    群組金鑰協議
    橢圓曲線 Diffie- Hellman
    短簽名
    Group communication
    Group key agreement protocol
    Elliptic Curve Diffie-Hellman
    Short signature
    Date: 2024
    Issue Date: 2024-08-05 13:56:34 (UTC+8)
    Abstract: 現在製造型企業為了能夠提高生產效能與效益, 因而工業物聯網(IIOT)、智慧工廠發展盛行,在企業工 廠內部的製造生產設備、檢測儀器、和其他製造所用 之設備等,都有提供網路連線之功能。雖然這些設備 都能夠快速獲取即時製造資訊,並連上網路傳送資 料,但這些設備之間的相互通訊與資料的保護,目前 是一個具有挑戰的問題之一。鑑於這些 IIOT 的設備不 管是運算能力或者資源都是有受限且較為薄弱。在設 備能力與資源有限情況下,群組金鑰交換協議(Group Key Agreement protocol,GKAP)就是一個不錯的解決方 案之一。在眾多的群組金鑰協議中,Yang等人於 2023年提出了一個 Group Key Agreement Protocol Based on ECDH and Short Signature(GKA-SS)結合了橢圓曲 線 Diffie-Hellman (ECDH)金鑰交換協議以及短簽名的方式來生成群組金鑰協議,並驗證成員的身 份方式。此方法概念創新並具實務性,但效能上仍有 提升的空間。本文就是針對此協議架構再更近一步改 善其效能,針對通訊的訊息的認證與減少組成員的身 份驗證時間的優化。
    In order to enhance production efficiency and effectiveness, manufacturing enterprises are increasingly adopting Industrial Internet of Things (IIOT) and smart factory initiatives. Within the factory premises, manufacturing production equipment, inspection instruments, and other devices used in manufacturing are equipped with networking capabilities. While these devices can rapidly access real-time manufacturing information and connect to the internet to transmit data, one of the current challenges lies in the communication between these devices and the protection of data.Given that these IIOT devices are often constrained in computational capability and resources, Group Key Agreement Protocol (GKAP) emerges as a viable solution. Among various group key agreement protocols, Yang et al.proposed a Group Key Agreement Protocol Based on ECDH and Short Signature (GKA-SS) in 2023, which combines Elliptic Curve Diffie-Hellman (ECDH) key exchange protocol with Short Signature (BLS) for generating group key agreements and validating member identities. While this approach is innovative and practical, there is still room for improvement in terms of performance.This paper aims to further enhance the efficiency of this protocol framework, focusing on optimizing message authentication and reducing the time required for member identity verification during communication.
    Reference: [1] Zeyu Yang, Ziqing Wang, Fei Qiu, and Fagen Li. A group key agreement protocol
    based on ecdh and short signature. Journal of Information Security and Applications,
    72:103388, 2023.
    [2] Whitfield Diffie and Martin Hellman. New directions in cryptography. 1976.
    [3] Ingemar Ingemarsson, Donald Tang, and C Wong. A conference key distribution
    system. IEEE Transactions on Information theory, 28(5):714–720, 1982.
    [4] Michael Steiner, Gene Tsudik, and Michael Waidner. Cliques: A new approach to
    group key agreement. In Proceedings. 18th International Conference on Distributed
    Computing Systems (Cat. No. 98CB36183), pages 380–387. IEEE, 1998.
    [5] Vankamamidi S Naresh and Nistala VES Murthy. Provably secure group key agreement
    protocol based on ecdh with integrated signature. Security and Communication
    Networks, 9(10):1085–1102, 2016.
    [6] VS Janani and MSK Manikandan. Enhanced security using cluster based certificate
    management and ecc-crt key agreement schemes in mobile ad hoc networks. Wireless
    Personal Communications, 97:6131–6150, 2017.
    [7] Jung-Wen Lo, Chun-Yueh Wu, and Shu-Fen Chiou. A lightweight authentication and
    key agreement scheme for telecare medicine information system. Journal of Internet
    Technology, 21(1):263–272, 2020.
    [8] Qikun Zhang, Liang Zhu, Yongjiao Li, Zhaorui Ma, Junling Yuan, Jun Zheng, and
    Shan Ai. A group key agreement protocol for intelligent internet of things system.
    International Journal of Intelligent Systems, 37(1):699–722, 2022.
    [9] Manoj Kumar Mishra, Varun Shukla, Atul Chaturvedi, Pronaya Bhattacharya, and
    Sudeep Tanwar. A secure authenticated key agreement protocol using polynomials. In
    Proceedings of International Conference on Recent Innovations in Computing: ICRIC
    2022, Volume 1, pages 585–595. Springer, 2023.
    Description: 碩士
    國立政治大學
    資訊科學系碩士在職專班
    111971020
    Source URI: http://thesis.lib.nccu.edu.tw/record/#G0111971020
    Data Type: thesis
    Appears in Collections:[Executive Master Program of Computer Science of NCCU] Theses

    Files in This Item:

    File Description SizeFormat
    102001.pdf926KbAdobe PDF2View/Open


    All items in 政大典藏 are protected by copyright, with all rights reserved.


    社群 sharing

    著作權政策宣告 Copyright Announcement
    1.本網站之數位內容為國立政治大學所收錄之機構典藏,無償提供學術研究與公眾教育等公益性使用,惟仍請適度,合理使用本網站之內容,以尊重著作權人之權益。商業上之利用,則請先取得著作權人之授權。
    The digital content of this website is part of National Chengchi University Institutional Repository. It provides free access to academic research and public education for non-commercial use. Please utilize it in a proper and reasonable manner and respect the rights of copyright owners. For commercial use, please obtain authorization from the copyright owner in advance.

    2.本網站之製作,已盡力防止侵害著作權人之權益,如仍發現本網站之數位內容有侵害著作權人權益情事者,請權利人通知本網站維護人員(nccur@nccu.edu.tw),維護人員將立即採取移除該數位著作等補救措施。
    NCCU Institutional Repository is made to protect the interests of copyright owners. If you believe that any material on the website infringes copyright, please contact our staff(nccur@nccu.edu.tw). We will remove the work from the repository and investigate your claim.
    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - Feedback